By Carl Herberger, Vice President of Security, Radware When a movie character is kidnapped, paying the ransom doesn’t always result in the hostage’s release. Quite often, the kidnappers simply ask for more money. In real life, companies who have become victims of a ransom attack face a similar situation. Paying the ransom encourages the hackers to attack again, and certainly keeps them in business to attack others. Ransom attacks have come primarily in two forms: Distributed Denial-of-Service (DDoS) attacks flood a network or website with requests, paralyzing it, while a second form, so-called non-volumetric attacks, exploit vulnerabilities in a system to encrypt and lock a hard drive. Both models, as…